Showing 181–190 of 654 questions
In Infosys' API rate limiting strategy, what does the Token Bucket algorithm control?
A
User authentication credentials
B
The maximum number of requests allowed within a time window
C
Database transaction rollback
D
SSL certificate validation
Correct Answer:
B. The maximum number of requests allowed within a time window
Explanation:
The Token Bucket algorithm is used to control the rate at which API requests are allowed, preventing abuse and ensuring fair resource utilization.
Which of the following best describes the Infosys' commitment to 'Digital-First' customer experience in 2024-25?
A
Completely eliminating phone support
B
Prioritizing digital channels while maintaining traditional support options
C
Increasing service costs for digital transactions
D
Removing human interaction from all services
Correct Answer:
B. Prioritizing digital channels while maintaining traditional support options
Explanation:
Infosys' Digital-First approach prioritizes digital channels and experiences while still maintaining traditional support options for customer choice and accessibility.
In a distributed system at Infosys, what is the primary challenge that CAP theorem addresses?
A
Memory management
B
The impossibility of simultaneously achieving Consistency, Availability, and Partition Tolerance
C
Network bandwidth optimization
D
Cache invalidation strategies
Correct Answer:
B. The impossibility of simultaneously achieving Consistency, Availability, and Partition Tolerance
Explanation:
CAP theorem states that distributed systems can guarantee only two out of three properties: Consistency, Availability, and Partition Tolerance.
What is Infosys' primary focus area in its 2024-25 AI and ML initiatives?
A
Replacing all human workers with automation
B
Enhancing human capabilities through AI-powered tools and intelligent automation
C
Building AI systems without human oversight
D
Reducing investment in traditional IT services
Correct Answer:
B. Enhancing human capabilities through AI-powered tools and intelligent automation
Explanation:
Infosys focuses on augmenting human potential with AI, creating human-AI collaboration models rather than replacement strategies.
In Infosys' cybersecurity protocols, which encryption standard is mandated for data at rest?
A
DES (Data Encryption Standard)
B
AES-256 (Advanced Encryption Standard)
C
ROT13
D
Base64 encoding
Correct Answer:
B. AES-256 (Advanced Encryption Standard)
Explanation:
AES-256 is the industry-standard encryption for data at rest, providing 256-bit key strength and is mandated in Infosys' security policies.
What does OWASP Top 10, which Infosys developers must follow, primarily address?
A
Database performance optimization
B
The most critical web application security risks
C
Cloud infrastructure best practices
D
Mobile app development frameworks
Correct Answer:
B. The most critical web application security risks
Explanation:
OWASP Top 10 lists the most critical web application security vulnerabilities that developers must understand and mitigate.
In Infosys' Agile methodology, what is a Sprint typically limited to in terms of duration?
A
1-2 weeks
B
2-4 weeks
C
4-8 weeks
D
8-12 weeks
Correct Answer:
B. 2-4 weeks
Explanation:
In Scrum-based Agile methodology used by Infosys, a Sprint typically lasts 2-4 weeks, allowing for regular feedback and iterations.
Which HTTP status code should a REST API return when a resource is successfully created?
A
200 OK
B
201 Created
C
202 Accepted
D
204 No Content
Correct Answer:
B. 201 Created
Explanation:
HTTP status code 201 Created is the correct response when a new resource is successfully created via POST request, typically including the resource location in the response header.
In Infosys' commitment to sustainability 2024-25, what is the target for renewable energy adoption?
A
25% of total energy consumption
B
50% of total energy consumption
C
75% of total energy consumption
D
100% of total energy consumption
Correct Answer:
C. 75% of total energy consumption
Explanation:
Infosys has committed to achieving 75% renewable energy consumption by 2025 as part of its sustainability and ESG initiatives.
What is the time complexity of the binary search algorithm when searching in a sorted array of n elements?
A
O(n)
B
O(n log n)
C
O(log n)
D
O(n²)
Correct Answer:
C. O(log n)
Explanation:
Binary search has O(log n) time complexity as it divides the search space in half with each iteration, making it highly efficient for sorted data.